How to do it...

To make things a little more interesting, let's use this interception/modification technique to bypass a basic protection mechanism. Perform the following steps:

  1. Browse to OWASP Bricks and go to the exercise Upload 2 (http://192.168.56.11/owaspbricks/upload-2).
  2. Request interception is enabled by default in Burp Suite; if the page won't load, go to Burp Suite then to Proxy | Intercept and click on the pressed button, Intercept is on:
  1. Here we have a file upload form that is supposed to upload only images. Let's try to upload one. Click on Browse and select any image file (PNG, JPG, or BMP):
  1. After clicking Open, click

Get Kali Linux Web Penetration Testing Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.